Lucene search

K
gentooGentoo FoundationGLSA-200901-02
HistoryJan 11, 2009 - 12:00 a.m.

JHead: Multiple vulnerabilities

2009-01-1100:00:00
Gentoo Foundation
security.gentoo.org
8

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.5%

Background

JHead is an exif jpeg header manipulation tool.

Description

Marc Merlin and John Dong reported multiple vulnerabilities in JHead:

  • A buffer overflow in the DoCommand() function when processing the cmd argument and related to potential string overflows (CVE-2008-4575).
  • An insecure creation of a temporary file (CVE-2008-4639).
  • A error when unlinking a file (CVE-2008-4640).
  • Insufficient escaping of shell metacharacters (CVE-2008-4641).

Impact

A remote attacker could possibly execute arbitrary code by enticing a user or automated system to open a file with a long filename or via unspecified vectors. It is also possible to trick a user into deleting or overwriting files.

Workaround

There is no known workaround at this time.

Resolution

All JHead users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/jhead-2.84-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/jhead< 2.84-r1UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.5%